Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2022:4764 - Security Advisory
Issued:
2022-05-26
Updated:
2022-05-26

RHSA-2022:4764 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Low: RHV RHEL Host (ovirt-host) [ovirt-4.5.0] security update

Type/Severity

Security Advisory: Low

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated host packages that fix several bugs and add various enhancements are now available.

Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The ovirt-host package consolidates host package requirements into a single meta package.

Security Fix(es) from Bugzilla:

  • vdsm: disclosure of sensitive values in log files (CVE-2022-0207)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es) from Bugzilla:

  • With this release, RHV 4.4 SP1 has been upgraded to use ansible-core in cockpit-ovirt. (BZ#2066042)
  • Rebase package(s) to version: 0.16.0

Highlights and notable enhancements: https://github.com/oVirt/cockpit-ovirt/releases/tag/cockpit-ovirt-0.16.0 (BZ#2067078)

  • Rebase package(s) to version: 0.6.2 (BZ#2060889)
  • Rebase package(s) to version: 4.5.0

Highlights, important fixes, or notable enhancements: (BZ#2054733)

  • Feature: Include the package nvme-cli on virtualization hosts

Reason: The package is requested in RHEL 8 Managing Storage devices, Chapter 15. NVMe over fabrics using FC for accessing that hardware

Result: the needed package is available on the host. (BZ#2058177)

  • Previously, the ovirt-ha-broker service failed to start on a host with a DISA STIG profile.

In this release, the ovirt-ha-broker binaries were moved to /usr/libexec. As a result, the ovirt-ha-broker service succeeds to start on a host with a DISA STIG profile. (BZ#2050108)

  • Previously, during self-hosted engine deployment, the tpgt value was not used in the iSCSI login, creating duplicate iSCSI sessions.

IN this release, the tpgt value is used in the iSCSI login, and no duplicate iSCSI sessions are created. (BZ#1768969)

  • With this release, the self-hosted engine installation supports selecting either DISA STIG or PCI-DSS security profiles for the self-hosted engine VM. (BZ#2029830)
  • Red Hat Virtualization 4.4 SP1 now requires ansible-core >= 2.12.0 to execute Ansible playbooks/roles internally from RHV components. (BZ#2052686)
  • Rebase package(s) to version: 2.6.1

Highlights, important fixes, or notable enhancements: (BZ#2050512)

  • RHV Hypervisor 4.4 SP1, with exception to RHV-H, is able to run on a host with RHEL 8.6 DISA STIG openscap profile applied. (BZ#2015802)
  • Previously, SCSI reservation was not set for disks that are hot-plugged.

In this release, the SCSI reservation works for disks that are being hot-plugged. (BZ#2028481)

  • The Red Hat Virtualization Host is now capable of running on a machine with the PCI-DSS security profile. (BZ#2030226)
  • Previously, if storage problems occurred and disappeared during a VM migration attempt, it sometimes led to the VM being paused and not resuming even if the VM had an auto-resume policy set.

In this release, the VM is handled according to its resume behavior policy when the storage state changes during a VM migration attempt. (BZ#2010478)

  • Previously, the VDSM used UDEV links to create the LVM filter. As a result, the LVM sometimes grabbed SCSI devices during the boot process by mistake.

In this release, the LVM does not not try to grab SCSI devices during the boot process, only using the multipath device specified in the LVM filter. (BZ#2016173)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/2974891

Affected Products

  • Red Hat Virtualization 4 for RHEL 8 x86_64
  • Red Hat Virtualization Host 4 for RHEL 8 x86_64
  • Red Hat Virtualization for IBM Power LE 4 for RHEL 8 ppc64le

Fixes

  • BZ - 1768969 - Duplicate iSCSI sessions in the hosted-engine deployment host when the tpgt is not 1
  • BZ - 1787192 - Host fails to activate in RHV and goes to non-operational status when some of the iSCSI targets are down
  • BZ - 1878724 - vdsm-tool configure is failing with error "dependency job for libvirtd.service failed"
  • BZ - 1986732 - ovirt-ha services cannot set the LocalMaintenance mode in the storage metadata and are in a restart loop
  • BZ - 2010478 - After storage error HA VMs failed to auto resume.
  • BZ - 2015802 - [RFE] RHV hypervisors should support running on host with DISA STIG security profile applied
  • BZ - 2028481 - SCSI reservation is not working for hot plugged VM disks
  • BZ - 2029830 - [RFE] Hosted engine should accept OpenSCAP profile name instead of bool
  • BZ - 2030226 - [RFE] RHV hypervisors should support running on hosts with the PCI-DSS security profile applied
  • BZ - 2039248 - CVE-2022-0207 vdsm: disclosure of sensitive values in log files
  • BZ - 2050108 - hosted-engine-setup fails to start ovirt-ha-broker service on RHEL-H with DISA STIG
  • BZ - 2050512 - Upgrade ovirt-hosted-engine-setup to 2.6.1
  • BZ - 2052686 - [RFE] Upgrade to ansible-core-2.12 in hosted-engine-setup
  • BZ - 2054733 - Upgrade ovirt-host to 4.5.0
  • BZ - 2058177 - [RFE] Include the package nvme-cli on virtualization hosts
  • BZ - 2060889 - Upgrade mom to 0.6.2
  • BZ - 2066042 - Require ansible-core instead of ansible in cockpit-ovirt
  • BZ - 2067078 - Upgrade cockpit-ovirt to 0.16.0

CVEs

  • CVE-2022-0207

References

  • https://access.redhat.com/security/updates/classification/#low
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Virtualization 4 for RHEL 8

SRPM
cockpit-ovirt-0.16.0-1.el8ev.src.rpm SHA-256: b23e8685b8d7faf23e980c925e0280916fc870b0fa1ecc237dbe809de1aa9bda
mom-0.6.2-1.el8ev.src.rpm SHA-256: 82ba3b262493181643a8dfab13f9aa5e70017f54154fe32e905ea90b7069bfff
ovirt-host-4.5.0-3.el8ev.src.rpm SHA-256: d1166d76602ea7f03034e33f3946394e1226c0162f7df1f941a906c99b07a21c
ovirt-hosted-engine-ha-2.5.0-1.el8ev.src.rpm SHA-256: f3b7640b263137872c9e8620b0119ad494f0a34ed30b67bfab5afd5a9403e830
ovirt-hosted-engine-setup-2.6.3-1.el8ev.src.rpm SHA-256: 9f2ac28fc950a0169a82f7c4a0ad0244c825577e7cc02afc5cb699ae5f854905
vdsm-4.50.0.13-1.el8ev.src.rpm SHA-256: 8ff30e07005d8043faef41cdd8fa3017c0a1c0106a613c3056f83ec6201a6b03
x86_64
cockpit-ovirt-dashboard-0.16.0-1.el8ev.noarch.rpm SHA-256: b77bf2a335ed6583c10b43e2dd2a8a099bf7dcfb312aeb1e6570a231b1e54b72
mom-0.6.2-1.el8ev.noarch.rpm SHA-256: 19fcefc67240eef84dff59b10b50830a308ff29b27e55e78c8c12adc945b1462
ovirt-host-4.5.0-3.el8ev.x86_64.rpm SHA-256: 43ab7bc3f778af133df5474fd59fc385e6df19ce21287b44433a5f39e7a95588
ovirt-host-dependencies-4.5.0-3.el8ev.x86_64.rpm SHA-256: c3f5a254acb35e907ba1a07bd262a56229997f94c0e4fd33ec7eb6aa78e51035
ovirt-hosted-engine-ha-2.5.0-1.el8ev.noarch.rpm SHA-256: 1041de2d78b70282c8b29ff65c83c4888304ee653468df5686ed5b9f357f2016
ovirt-hosted-engine-setup-2.6.3-1.el8ev.noarch.rpm SHA-256: 103dfeac88be836bd956c91a395bdb776b976e3b3dfbb3bd4e847ed41f1fe920
vdsm-4.50.0.13-1.el8ev.x86_64.rpm SHA-256: a798d7b8e3d85dbb28e6d85edcb1e24befedf7ceacfb4f185a8d8b95bb18dae9
vdsm-api-4.50.0.13-1.el8ev.noarch.rpm SHA-256: e667e3200807e876ac7c00faa6f25d5a7bcf0259537332a263650fd61347ec41
vdsm-client-4.50.0.13-1.el8ev.noarch.rpm SHA-256: fc71eb7b363ab958516d5773f8699d1eec80d99d48ecd328eaafd922afc8d090
vdsm-common-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 7ee7d224365829004598fbe485b0bdf2151bac3eb9705685312fb0e62db36370
vdsm-gluster-4.50.0.13-1.el8ev.x86_64.rpm SHA-256: 39f7d4837436ef1ccee57460c909b1de7892d7578db22fea934a7a3b9dc25112
vdsm-hook-checkips-4.50.0.13-1.el8ev.x86_64.rpm SHA-256: d238ae9cd1021557630afba6478b5e7fa27edeac1339eef19e9af16b46a1a4de
vdsm-hook-cpuflags-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 6ec052ca4f0fcc98366dfb4b0521e0c9d9b1088c33a98e9c681541900091e0cb
vdsm-hook-ethtool-options-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 99fabcee39c1dc83e6cac894b82d82f36cd38cb2061c99172d157fb9e63f2932
vdsm-hook-extra-ipv4-addrs-4.50.0.13-1.el8ev.x86_64.rpm SHA-256: 89614050ba8359110b53825f2bb01e8bcc269eb785dbb9c0344ff0c1ad45c7c9
vdsm-hook-fcoe-4.50.0.13-1.el8ev.noarch.rpm SHA-256: dfc2c9d0b29075efa99dbe05cf4eda59786b7b1f1fe2a69db842a935b8a21c39
vdsm-hook-localdisk-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 8abd1856ba594f8a6c980fdd4088cd721db631bad127365bd33d89a4c478a255
vdsm-hook-nestedvt-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 0e4fa0b75ec917c7e3a7cb388f38cef16793403e6ac2334c0e8e050845fbc4f7
vdsm-hook-openstacknet-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 4ae6af3ec3ae8bac1e82b02c06db4eb54ea53be2d140bd57fc8d91efc5e9b64b
vdsm-hook-vhostmd-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 173c1a2d9d20cbd7188786bd95d86de9149990480b1445b9e08f84bcf78c4913
vdsm-http-4.50.0.13-1.el8ev.noarch.rpm SHA-256: f0bbc789f386dd1de23fff43c560f7be38c628da11b6d7595b0a7e314dff4e1a
vdsm-jsonrpc-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 4c6c249fc713e685a80fdd580ba92791e749caf47d1eb26e769b28ae7c76cf26
vdsm-network-4.50.0.13-1.el8ev.x86_64.rpm SHA-256: 5b3e765488bda88909183d0ddd6a59906a43445fe5685ee3693ad0800af9805f
vdsm-python-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 9fd659051bbbaea19a2ada0749312a78d6ff2ab5ffec2b761e85af037eb10d03
vdsm-yajsonrpc-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 72dfd63af79369366450a09d2a2779ddda6b06b295619fa02de718e3a9a2520a

Red Hat Virtualization Host 4 for RHEL 8

SRPM
vdsm-4.50.0.13-1.el8ev.src.rpm SHA-256: 8ff30e07005d8043faef41cdd8fa3017c0a1c0106a613c3056f83ec6201a6b03
x86_64
vdsm-hook-checkips-4.50.0.13-1.el8ev.x86_64.rpm SHA-256: d238ae9cd1021557630afba6478b5e7fa27edeac1339eef19e9af16b46a1a4de
vdsm-hook-cpuflags-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 6ec052ca4f0fcc98366dfb4b0521e0c9d9b1088c33a98e9c681541900091e0cb
vdsm-hook-ethtool-options-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 99fabcee39c1dc83e6cac894b82d82f36cd38cb2061c99172d157fb9e63f2932
vdsm-hook-extra-ipv4-addrs-4.50.0.13-1.el8ev.x86_64.rpm SHA-256: 89614050ba8359110b53825f2bb01e8bcc269eb785dbb9c0344ff0c1ad45c7c9
vdsm-hook-fcoe-4.50.0.13-1.el8ev.noarch.rpm SHA-256: dfc2c9d0b29075efa99dbe05cf4eda59786b7b1f1fe2a69db842a935b8a21c39
vdsm-hook-localdisk-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 8abd1856ba594f8a6c980fdd4088cd721db631bad127365bd33d89a4c478a255
vdsm-hook-nestedvt-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 0e4fa0b75ec917c7e3a7cb388f38cef16793403e6ac2334c0e8e050845fbc4f7
vdsm-hook-openstacknet-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 4ae6af3ec3ae8bac1e82b02c06db4eb54ea53be2d140bd57fc8d91efc5e9b64b
vdsm-hook-vhostmd-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 173c1a2d9d20cbd7188786bd95d86de9149990480b1445b9e08f84bcf78c4913

Red Hat Virtualization for IBM Power LE 4 for RHEL 8

SRPM
mom-0.6.2-1.el8ev.src.rpm SHA-256: 82ba3b262493181643a8dfab13f9aa5e70017f54154fe32e905ea90b7069bfff
ovirt-host-4.5.0-3.el8ev.src.rpm SHA-256: d1166d76602ea7f03034e33f3946394e1226c0162f7df1f941a906c99b07a21c
ovirt-hosted-engine-ha-2.5.0-1.el8ev.src.rpm SHA-256: f3b7640b263137872c9e8620b0119ad494f0a34ed30b67bfab5afd5a9403e830
vdsm-4.50.0.13-1.el8ev.src.rpm SHA-256: 8ff30e07005d8043faef41cdd8fa3017c0a1c0106a613c3056f83ec6201a6b03
ppc64le
mom-0.6.2-1.el8ev.noarch.rpm SHA-256: 19fcefc67240eef84dff59b10b50830a308ff29b27e55e78c8c12adc945b1462
ovirt-host-4.5.0-3.el8ev.ppc64le.rpm SHA-256: 870088ef9d5b9716c4c40539d6c6c9f4a50bbd1d9c369473f51651599e2a9ef1
ovirt-host-dependencies-4.5.0-3.el8ev.ppc64le.rpm SHA-256: c2f49bae4396f240ab319668e16e18453a80b2de98aee2226e332d0442d3ced3
vdsm-4.50.0.13-1.el8ev.ppc64le.rpm SHA-256: 914117641badbe81593a460711211049c13cba379d789f5b186343835609a4d1
vdsm-api-4.50.0.13-1.el8ev.noarch.rpm SHA-256: e667e3200807e876ac7c00faa6f25d5a7bcf0259537332a263650fd61347ec41
vdsm-client-4.50.0.13-1.el8ev.noarch.rpm SHA-256: fc71eb7b363ab958516d5773f8699d1eec80d99d48ecd328eaafd922afc8d090
vdsm-common-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 7ee7d224365829004598fbe485b0bdf2151bac3eb9705685312fb0e62db36370
vdsm-hook-checkips-4.50.0.13-1.el8ev.ppc64le.rpm SHA-256: 00a92ef1e9b38a93db57d9a85e9e4f3453ce140c6117e3f44cdfe216228211a5
vdsm-hook-cpuflags-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 6ec052ca4f0fcc98366dfb4b0521e0c9d9b1088c33a98e9c681541900091e0cb
vdsm-hook-ethtool-options-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 99fabcee39c1dc83e6cac894b82d82f36cd38cb2061c99172d157fb9e63f2932
vdsm-hook-extra-ipv4-addrs-4.50.0.13-1.el8ev.ppc64le.rpm SHA-256: 30ed18a29ab73266a218e9a06f14b967ebbe752d728f00aaddcdd5ea464dcb8b
vdsm-hook-fcoe-4.50.0.13-1.el8ev.noarch.rpm SHA-256: dfc2c9d0b29075efa99dbe05cf4eda59786b7b1f1fe2a69db842a935b8a21c39
vdsm-hook-localdisk-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 8abd1856ba594f8a6c980fdd4088cd721db631bad127365bd33d89a4c478a255
vdsm-hook-nestedvt-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 0e4fa0b75ec917c7e3a7cb388f38cef16793403e6ac2334c0e8e050845fbc4f7
vdsm-hook-openstacknet-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 4ae6af3ec3ae8bac1e82b02c06db4eb54ea53be2d140bd57fc8d91efc5e9b64b
vdsm-hook-vhostmd-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 173c1a2d9d20cbd7188786bd95d86de9149990480b1445b9e08f84bcf78c4913
vdsm-http-4.50.0.13-1.el8ev.noarch.rpm SHA-256: f0bbc789f386dd1de23fff43c560f7be38c628da11b6d7595b0a7e314dff4e1a
vdsm-jsonrpc-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 4c6c249fc713e685a80fdd580ba92791e749caf47d1eb26e769b28ae7c76cf26
vdsm-network-4.50.0.13-1.el8ev.ppc64le.rpm SHA-256: 5f08b15f6e689572f04b01b8b062b5cc109c4b95d16ad788e1d0bc9ddb570de1
vdsm-python-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 9fd659051bbbaea19a2ada0749312a78d6ff2ab5ffec2b761e85af037eb10d03
vdsm-yajsonrpc-4.50.0.13-1.el8ev.noarch.rpm SHA-256: 72dfd63af79369366450a09d2a2779ddda6b06b295619fa02de718e3a9a2520a

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter